SlideShare a Scribd company logo
1 of 26
11
How useful are
IDP/Antispam/Antivirus/Content
filtering services to protect ransomware ?
Bhairave Maulekhi
Assistant Manager-technology
Zyxel Technology Pvt. Ltd
2
Big Numbers of 2016
Source: KasperskyLab
3Source: KasperskyLab
4
Agenda
01
Ransomware
Introduction
02
How USG Stops
Ransomware
Something You Need to
Know
USG Provides Comprehensive
Protection
5
What is Ransomware?
• Ransomware is a type of malware that
prevents or limits users from accessing
their system.
• Encrypted system/file is the typical way
Ransomware did.
• This type of malware forces its victims
to pay the ransom through certain
online payment methods in order to
grant access to their systems, or to get
their data back.
6
Common Behaviors of Ransomware
• When hit, it offers users the option of
decrypting 5 files for free—as proof that
decryption is possible.
• Users are also given 96 hours, instead of
72 hours, to pay the ransom fee which
ranges from $500~$1,000.
• In some case, infection could occur
through embedded URL over email or
compromised web site with drive-by
download technics.
TeslaCrypt Ransom Page / Source: Google Search
7
7ev3n-HONE$T Ransom Page / Source: Google Search
8
2016 Ransom Cases
Source: TheHackerNews.com
9
• Once again the heat was felt by the
Los Angeles Valley College (LAVC)
when hackers managed to infect its
computer network with ransomware
and demanded US$28,000 payment
in Bitcoins to get back online.
• The cyber-attack occurred over
winter break and caused
widespread disruption to online,
financial aid, email and voicemail
systems, including locking out 1,800
students and staffs from their
computers.
Source: TheHackerNews.com
2017 Ransom Case
10
Typical Threat Infection Method
11
How Ransomware works?
1. Spear-phishing email
2. User opens email 3-1. Fake attached file is executed
4. Files encrypted5. Ransom message is displayed
6. Damage occurred
1212
How USG Stops Ransomware
13
USG provides Comprehensive Protection
1). Anti-Spam stops
phishing email
2). Content Filter stops user
to open unsafe/malicious
link (from email)
3). Anti-Virus protects
user not to download
malware-infected files
4). IDP detects and stops
Ransomware attempting to
contact CC&C
1414
E-mail is an indispensable form of communication that has made its way into every aspect of
our modern lives. However, statistics show that more than 70 percent of all e-mail is spam,
and more than 90 percent of spam carries some form of malware. To defend against spam,
malware, and phishing attacks, it is essential to deploy effective anti-spam technology. With
that in mind, Zyxel Anti-Spam leverages a cloud-based pre-perimeter defence system to
protect your e-mail from malware.
Different from the traditional mail server, the UTM Anti-Spam Service can filter out malware
and spam to provide the most thorough protection for any end point under an internal
network. Zyxel Anti-Spam service reduces unsolicited e-mail and increases business
productivity by allowing you to block spam on the network edge, thereby unburdening your
e-mail servers.
Anti-Spam
E-mail is the most common method and starting point of attacks aiming at organizations. Anti-Spam detects
and filters spam e-mails with comprehensive, multi-layered protections.
15
Anti-Spam Secured Email In-&-Out
• Enable reputation-based email protection
• Ransomware usually uses spear-phishing emails as 1st step
• Zyxel Anti-Spam protects your network not only from spam as well from
suspicious emails
• Real time protection from cloud-based automated sharing and updating
1616
Content Filtering 2.0
We protect your business from undesirable access to malicious, hacked or inappropriate websites with
technologies such as URL filtering, HTTPS domain filter, safe search and GeoIP blocking.
While nobody would dispute that the Internet is an indispensable tool for business, there exist many
malicious sites that would trap users, potentially infecting systems with viruses or installing spyware when
carelessly accessed. An efficient solution is necessary for administrators to manage web access and control
traffic when employees access websites. ZyXEL Content Filtering is a fully integrated security subscription
service protecting networks against malicious attacks from rogue websites while helping administrators
manage and control user access.
Content Filtering 2.0 is introduced with improving visibility and detection coverage. It includes URL
filtering, HTTPS domain filter, safe search and GeoIP blocking. Now you can upgrade to Content Filtering
2.0 with the USG/ZyWALL ZLD 4.20 firmware and enjoy the new features that are strongly required by
education and other sectors for safe Internet browsing and better detection coverage.
17
Content Filter Secured Web Connection
• Enable protection on accessing every URL
• When user clicks on the link in emails and attempt to connect, those URL should
be checked
• Zyxel Content Filtering for USG/ZyWALL covers the world’s largest URL
database and keeps updated
1818
Zyxel Anti-Virus security subscription is a gateway-level Anti-Virus technology targeting
known malware including viruses, Trojans, worms, spyware and rogue ware, Zyxel Anti-
Virus scans traffic on major protocols including HTTP, HTTPS, FTP, SMTP, and POP3.
Gateway-level Anti-Virus protection is first-line essential security for business networks to
guard against these threats.
Anti-Virus
19
Anti-Virus Stops Malware-infected Files
• Enable anti-malware protection
• Files attached in the mails should be thoroughly scanned
• Zyxel Anti-Virus protects the users from Viruses, Worms, Trojans, and Malware
including protocols like SMTP and POP3
• Along with SSL Inspection, USG/ZyWALL can further deal with encrypted emails
2020
Today’s networks are under attack from an ever-expanding array of threats - viruses,
malware, and other exploits. Hackers are increasingly adept at avoiding detection, and unlike
with automated threats like viruses, the goal of these intrusions is often the theft of specific
personal or financial information. For this reason, users need more reliable safeguards to
protect private data.
Zyxel IDP service helps enterprises achieve timely security against known and zero-day
attacks while fully safeguarding a network environment by providing anomaly traffic
detection and prevention. It guards against evasion intrusions by blocking well-known Trojan
horses and back door applications that can infiltrate your internal network. Deep packet
inspection is used for intrusion detection and prevention, web application protection, and
application control.
Guards your business from a wide range of attacks and suspicious activities – such as SQL injection,
DoS and malicious backdoor applications.
Intrusion Detection and Prevention (IDP)
21
IDP Monitor Network Behaviors
• Put the threat intelligence on
• Abnormal behaviors should be monitored and detected
• Zyxel Intrusion Detection & Protection closely watch the network behaviors
and detect the attempting connections to the CC&C or backdoor program.
22
PREVENT, not REACT
23
Ransomware Prevention
Security Gateway Provides Comprehensive Protection
• To maximize your protection against malware, including Ransomware.
• To stop threat at different points of your next environment.
24
Next Generation USG
 Anti-malware Protection (Anti-Virus)
 Web Security (Content Filter)
 Email Security (Anti-Spam)
 Intrusion Detection & Prevention (IDP)
 SSL Inspection
 Hybrid VPN (IPSec/SSL/L2TP over IPSec)
 Ultra-High Performance
 High-Availability
 Firewall/NAT
 BWM
25
USG/ZyWALL UTM Service License
2626

More Related Content

What's hot

Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security TechnologiesRuchikaSachdeva4
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...wajug
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing ThreatNick Miller
 
How to tackle the Ransomware threat "WannaCry" | Sysfore
How to tackle the Ransomware threat "WannaCry" | SysforeHow to tackle the Ransomware threat "WannaCry" | Sysfore
How to tackle the Ransomware threat "WannaCry" | SysforeSysfore Technologies
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public SectorSeqrite
 
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz Asia Pte Ltd
 
Threat and Mitigation
Threat and MitigationThreat and Mitigation
Threat and MitigationNoel Waterman
 
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Netpluz Asia Pte Ltd
 
2 factor authentication beyond password : enforce advanced security with au...
2  factor  authentication beyond password : enforce advanced security with au...2  factor  authentication beyond password : enforce advanced security with au...
2 factor authentication beyond password : enforce advanced security with au...NetwayClub
 
Are ransomware attacks the problem for web hosting firms?
Are ransomware attacks the problem for web hosting firms?Are ransomware attacks the problem for web hosting firms?
Are ransomware attacks the problem for web hosting firms?ahanashrin
 
SonicWALL Advanced Features
SonicWALL Advanced FeaturesSonicWALL Advanced Features
SonicWALL Advanced FeaturesDavid Perkins
 
Cisco Content Security
Cisco Content SecurityCisco Content Security
Cisco Content SecurityCisco Canada
 
Securign siem for small business
Securign   siem for small businessSecurign   siem for small business
Securign siem for small businessRajul Sthapak
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowIBM Security
 
This is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XThis is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XSophos Benelux
 
D zone-firewall-datasheet
D zone-firewall-datasheetD zone-firewall-datasheet
D zone-firewall-datasheetLindsay Carreau
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionGiovanni Giovannelli
 

What's hot (20)

Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
 
Ransomware - Friend or Foe
Ransomware - Friend or FoeRansomware - Friend or Foe
Ransomware - Friend or Foe
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
How to tackle the Ransomware threat "WannaCry" | Sysfore
How to tackle the Ransomware threat "WannaCry" | SysforeHow to tackle the Ransomware threat "WannaCry" | Sysfore
How to tackle the Ransomware threat "WannaCry" | Sysfore
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
 
Threat and Mitigation
Threat and MitigationThreat and Mitigation
Threat and Mitigation
 
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
 
2 factor authentication beyond password : enforce advanced security with au...
2  factor  authentication beyond password : enforce advanced security with au...2  factor  authentication beyond password : enforce advanced security with au...
2 factor authentication beyond password : enforce advanced security with au...
 
Are ransomware attacks the problem for web hosting firms?
Are ransomware attacks the problem for web hosting firms?Are ransomware attacks the problem for web hosting firms?
Are ransomware attacks the problem for web hosting firms?
 
SonicWALL Advanced Features
SonicWALL Advanced FeaturesSonicWALL Advanced Features
SonicWALL Advanced Features
 
Web server security challenges
Web server security challengesWeb server security challenges
Web server security challenges
 
Cisco Content Security
Cisco Content SecurityCisco Content Security
Cisco Content Security
 
Securign siem for small business
Securign   siem for small businessSecurign   siem for small business
Securign siem for small business
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
This is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XThis is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept X
 
D zone-firewall-datasheet
D zone-firewall-datasheetD zone-firewall-datasheet
D zone-firewall-datasheet
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
 

Similar to How Zyxel UTM Stops Ransomware....

Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfANUSREEASHOK5
 
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...cyberprosocial
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4Anne ndolo
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...
Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...
Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...cybluseo
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...cyberprosocial
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industrySeqrite
 
Choosing the Right Network Security for Your Business - Minerva.pdf
Choosing the Right Network Security for Your Business  - Minerva.pdfChoosing the Right Network Security for Your Business  - Minerva.pdf
Choosing the Right Network Security for Your Business - Minerva.pdfonline Marketing
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...AwodiranOlumide
 

Similar to How Zyxel UTM Stops Ransomware.... (20)

Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdf
 
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
 
Cyber security
Cyber securityCyber security
Cyber security
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...
Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...
Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
Choosing the Right Network Security for Your Business - Minerva.pdf
Choosing the Right Network Security for Your Business  - Minerva.pdfChoosing the Right Network Security for Your Business  - Minerva.pdf
Choosing the Right Network Security for Your Business - Minerva.pdf
 
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
Lecture 3.pptx
Lecture 3.pptxLecture 3.pptx
Lecture 3.pptx
 
Product brochure-print-spread
Product brochure-print-spreadProduct brochure-print-spread
Product brochure-print-spread
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
 

Recently uploaded

How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 

Recently uploaded (20)

How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

How Zyxel UTM Stops Ransomware....

  • 1. 11 How useful are IDP/Antispam/Antivirus/Content filtering services to protect ransomware ? Bhairave Maulekhi Assistant Manager-technology Zyxel Technology Pvt. Ltd
  • 2. 2 Big Numbers of 2016 Source: KasperskyLab
  • 4. 4 Agenda 01 Ransomware Introduction 02 How USG Stops Ransomware Something You Need to Know USG Provides Comprehensive Protection
  • 5. 5 What is Ransomware? • Ransomware is a type of malware that prevents or limits users from accessing their system. • Encrypted system/file is the typical way Ransomware did. • This type of malware forces its victims to pay the ransom through certain online payment methods in order to grant access to their systems, or to get their data back.
  • 6. 6 Common Behaviors of Ransomware • When hit, it offers users the option of decrypting 5 files for free—as proof that decryption is possible. • Users are also given 96 hours, instead of 72 hours, to pay the ransom fee which ranges from $500~$1,000. • In some case, infection could occur through embedded URL over email or compromised web site with drive-by download technics. TeslaCrypt Ransom Page / Source: Google Search
  • 7. 7 7ev3n-HONE$T Ransom Page / Source: Google Search
  • 8. 8 2016 Ransom Cases Source: TheHackerNews.com
  • 9. 9 • Once again the heat was felt by the Los Angeles Valley College (LAVC) when hackers managed to infect its computer network with ransomware and demanded US$28,000 payment in Bitcoins to get back online. • The cyber-attack occurred over winter break and caused widespread disruption to online, financial aid, email and voicemail systems, including locking out 1,800 students and staffs from their computers. Source: TheHackerNews.com 2017 Ransom Case
  • 11. 11 How Ransomware works? 1. Spear-phishing email 2. User opens email 3-1. Fake attached file is executed 4. Files encrypted5. Ransom message is displayed 6. Damage occurred
  • 12. 1212 How USG Stops Ransomware
  • 13. 13 USG provides Comprehensive Protection 1). Anti-Spam stops phishing email 2). Content Filter stops user to open unsafe/malicious link (from email) 3). Anti-Virus protects user not to download malware-infected files 4). IDP detects and stops Ransomware attempting to contact CC&C
  • 14. 1414 E-mail is an indispensable form of communication that has made its way into every aspect of our modern lives. However, statistics show that more than 70 percent of all e-mail is spam, and more than 90 percent of spam carries some form of malware. To defend against spam, malware, and phishing attacks, it is essential to deploy effective anti-spam technology. With that in mind, Zyxel Anti-Spam leverages a cloud-based pre-perimeter defence system to protect your e-mail from malware. Different from the traditional mail server, the UTM Anti-Spam Service can filter out malware and spam to provide the most thorough protection for any end point under an internal network. Zyxel Anti-Spam service reduces unsolicited e-mail and increases business productivity by allowing you to block spam on the network edge, thereby unburdening your e-mail servers. Anti-Spam E-mail is the most common method and starting point of attacks aiming at organizations. Anti-Spam detects and filters spam e-mails with comprehensive, multi-layered protections.
  • 15. 15 Anti-Spam Secured Email In-&-Out • Enable reputation-based email protection • Ransomware usually uses spear-phishing emails as 1st step • Zyxel Anti-Spam protects your network not only from spam as well from suspicious emails • Real time protection from cloud-based automated sharing and updating
  • 16. 1616 Content Filtering 2.0 We protect your business from undesirable access to malicious, hacked or inappropriate websites with technologies such as URL filtering, HTTPS domain filter, safe search and GeoIP blocking. While nobody would dispute that the Internet is an indispensable tool for business, there exist many malicious sites that would trap users, potentially infecting systems with viruses or installing spyware when carelessly accessed. An efficient solution is necessary for administrators to manage web access and control traffic when employees access websites. ZyXEL Content Filtering is a fully integrated security subscription service protecting networks against malicious attacks from rogue websites while helping administrators manage and control user access. Content Filtering 2.0 is introduced with improving visibility and detection coverage. It includes URL filtering, HTTPS domain filter, safe search and GeoIP blocking. Now you can upgrade to Content Filtering 2.0 with the USG/ZyWALL ZLD 4.20 firmware and enjoy the new features that are strongly required by education and other sectors for safe Internet browsing and better detection coverage.
  • 17. 17 Content Filter Secured Web Connection • Enable protection on accessing every URL • When user clicks on the link in emails and attempt to connect, those URL should be checked • Zyxel Content Filtering for USG/ZyWALL covers the world’s largest URL database and keeps updated
  • 18. 1818 Zyxel Anti-Virus security subscription is a gateway-level Anti-Virus technology targeting known malware including viruses, Trojans, worms, spyware and rogue ware, Zyxel Anti- Virus scans traffic on major protocols including HTTP, HTTPS, FTP, SMTP, and POP3. Gateway-level Anti-Virus protection is first-line essential security for business networks to guard against these threats. Anti-Virus
  • 19. 19 Anti-Virus Stops Malware-infected Files • Enable anti-malware protection • Files attached in the mails should be thoroughly scanned • Zyxel Anti-Virus protects the users from Viruses, Worms, Trojans, and Malware including protocols like SMTP and POP3 • Along with SSL Inspection, USG/ZyWALL can further deal with encrypted emails
  • 20. 2020 Today’s networks are under attack from an ever-expanding array of threats - viruses, malware, and other exploits. Hackers are increasingly adept at avoiding detection, and unlike with automated threats like viruses, the goal of these intrusions is often the theft of specific personal or financial information. For this reason, users need more reliable safeguards to protect private data. Zyxel IDP service helps enterprises achieve timely security against known and zero-day attacks while fully safeguarding a network environment by providing anomaly traffic detection and prevention. It guards against evasion intrusions by blocking well-known Trojan horses and back door applications that can infiltrate your internal network. Deep packet inspection is used for intrusion detection and prevention, web application protection, and application control. Guards your business from a wide range of attacks and suspicious activities – such as SQL injection, DoS and malicious backdoor applications. Intrusion Detection and Prevention (IDP)
  • 21. 21 IDP Monitor Network Behaviors • Put the threat intelligence on • Abnormal behaviors should be monitored and detected • Zyxel Intrusion Detection & Protection closely watch the network behaviors and detect the attempting connections to the CC&C or backdoor program.
  • 23. 23 Ransomware Prevention Security Gateway Provides Comprehensive Protection • To maximize your protection against malware, including Ransomware. • To stop threat at different points of your next environment.
  • 24. 24 Next Generation USG  Anti-malware Protection (Anti-Virus)  Web Security (Content Filter)  Email Security (Anti-Spam)  Intrusion Detection & Prevention (IDP)  SSL Inspection  Hybrid VPN (IPSec/SSL/L2TP over IPSec)  Ultra-High Performance  High-Availability  Firewall/NAT  BWM
  • 26. 2626

Editor's Notes

  1. 1.) In 2016, ransomware continued its rampage across the world, tightening its hold on data, devices, and on individuals and businesses. 2.) Ransomware number and family continue increase, 2,900 new modifications in Q1 to 32,091 in Q3 3.) At the start of the year, every 20 seconds somebody somewhere was attacked with ransomware – by the end of September, it was one every 10 seconds 4.) At the start of the year, every two minutes a business was attacked with ransomware – by the end of September, it was one every 40 seconds
  2. Malware number is still significant Payment typically is by bitcoin, which is untraceable.
  3. Pennsylvania Democrats' computers hit by ransomware cyberattack http://edition.cnn.com/2017/03/04/us/pennsylvania-democrats-ransomware/index.html